Honeypot Implementation in a Cloud Environment

01/02/2023
by   Stefan Machmeier, et al.
0

In this age of digitalization, Internet services face more attacks than ever. An attacker's objective is to exploit systems and use them for malicious purposes. Such efforts are rising as vulnerable systems can be discovered and compromised through Internet-wide scanning. One known methodology besides traditional security leverages is to learn from those who attack it. A honeypot helps to collect information about an attacker by pretending to be a vulnerable target. Thus, how honeypots can contribute to a more secure infrastructure makes an interesting topic of research. This thesis will present a honeypot solution to investigate malicious activities in heiCLOUD and show that attacks have increased significantly. To detect attackers in restricted network zones at Heidelberg University, a new concept to discover leaks in the firewall will be created. Furthermore, to consider an attacker's point of view, a method for detecting honeypots at the transport level will be introduced. Lastly, a customized OpenSSH server that works as an intermediary instance will be presented to mitigate these efforts.

READ FULL TEXT

page 39

page 41

page 42

research
08/25/2023

Implementing Snort Intrusion Prevention System (IPS) for Network Forensic Analysis

The security trade confidentiality, integrity and availability are the m...
research
09/22/2021

Gotta catch 'em all: a Multistage Framework for honeypot fingerprinting

Honeypots are decoy systems that lure attackers by presenting them with ...
research
04/16/2010

Behavioural Correlation for Detecting P2P Bots

In the past few years, IRC bots, malicious programs which are remotely c...
research
10/09/2021

Widen The Backdoor To Let More Attackers In

As collaborative learning and the outsourcing of data collection become ...
research
12/09/2022

Reconfigurable Intelligent Surfaces: The New Frontier of Next G Security

RIS is one of the significant technological advancements that will mark ...
research
05/05/2022

The Race to the Vulnerable: Measuring the Log4j Shell Incident

The critical remote-code-execution (RCE) Log4Shell is a severe vulnerabi...
research
10/16/2020

Pitfalls of Provably Secure Systems in Internet The Case of Chronos-NTP

The critical role that Network Time Protocol (NTP) plays in the Internet...

Please sign up or login with your details

Forgot password? Click here to reset